[Git][security-tracker-team/security-tracker][master] Merge Linux CVE changes from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jun 18 13:22:56 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a41b89f0 by Salvatore Bonaccorso at 2025-06-18T14:22:27+02:00
Merge Linux CVE changes from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,102 @@
+CVE-2025-38028 [NFS/localio: Fix a race in nfs_local_open_fh()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fa7ab64f1e2fdc8f2603aab8e0dd20de89cb10d9 (6.15-rc7)
+CVE-2025-38027 [regulator: max20086: fix invalid memory access]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6b0cd72757c69bc2d45da42b41023e288d02e772 (6.15-rc7)
+CVE-2025-38026 [x86/sev: Do not touch VMSA pages during SNP guest memory kdump]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d2062cc1b1c367d5d019f595ef860159e1301351 (6.15-rc7)
+CVE-2025-38025 [iio: adc: ad7606: check for NULL before calling sw_mode_config()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5257d80e22bf27009d6742e4c174f42cfe54e425 (6.15-rc6)
+CVE-2025-38024 [RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ NOTE: https://git.kernel.org/linus/f81b33582f9339d2dc17c69b92040d3650bb4bae (6.15-rc7)
+CVE-2025-38023 [nfs: handle failure of nfs_get_lock_context in unlock path]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ NOTE: https://git.kernel.org/linus/c457dc1ec770a22636b473ce5d35614adfe97636 (6.15-rc7)
+CVE-2025-38022 [RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem]
+ - linux 6.12.30-1
+ NOTE: https://git.kernel.org/linus/d0706bfd3ee40923c001c6827b786a309e2a8713 (6.15-rc7)
+CVE-2025-38021 [drm/amd/display: Fix null check of pipe_ctx->plane_state for update_dchubp_dpp]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a3b7e65b6be59e686e163fa1ceb0922f996897c2 (6.15-rc7)
+CVE-2025-38020 [net/mlx5e: Disable MACsec offload for uplink representor profile]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/588431474eb7572e57a927fa8558c9ba2f8af143 (6.15-rc7)
+CVE-2025-38019 [mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/92ec4855034b2c4d13f117558dc73d20581fa9ff (6.15-rc7)
+CVE-2025-38018 [net/tls: fix kernel panic when alloc_page failed]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/491deb9b8c4ad12fe51d554a69b8165b9ef9429f (6.15-rc7)
+CVE-2025-38017 [fs/eventpoll: fix endless busy loop after timeout has expired]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d9ec73301099ec5975505e1c3effbe768bab9490 (6.15-rc7)
+CVE-2025-38016 [HID: bpf: abort dispatch if device destroyed]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/578e1b96fad7402ff7e9c7648c8f1ad0225147c8 (6.15-rc7)
+CVE-2025-38015 [dmaengine: idxd: fix memory leak in error handling path of idxd_alloc]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/46a5cca76c76c86063000a12936f8e7875295838 (6.15-rc7)
+CVE-2025-38014 [dmaengine: idxd: Refactor remove call with idxd_cleanup() helper]
+ - linux 6.12.30-1
+ NOTE: https://git.kernel.org/linus/a409e919ca321cc0e28f8abf96fde299f0072a81 (6.15-rc7)
+CVE-2025-38013 [wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/82bbe02b2500ef0a62053fe2eb84773fe31c5a0a (6.15-rc7)
+CVE-2025-38012 [sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/428dc9fc0873989d73918d4a9cc22745b7bbc799 (6.15-rc7)
+CVE-2025-38011 [drm/amdgpu: csa unmap use uninterruptible lock]
+ - linux 6.12.30-1
+ NOTE: https://git.kernel.org/linus/a0fa7873f2f869087b1e7793f7fac3713a1e3afe (6.15-rc7)
+CVE-2025-38010 [phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b47158fb42959c417ff2662075c0d46fb783d5d1 (6.15-rc7)
+CVE-2025-38009 [wifi: mt76: disable napi on driver removal]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ NOTE: https://git.kernel.org/linus/78ab4be549533432d97ea8989d2f00b508fa68d8 (6.15-rc7)
+CVE-2025-38008 [mm/page_alloc: fix race condition in unaccepted memory handling]
+ - linux 6.12.30-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fefc075182275057ce607effaa3daa9e6e3bdc73 (6.15-rc7)
+CVE-2025-38007 [HID: uclogic: Add NULL check in uclogic_input_configured()]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e (6.15-rc7)
+CVE-2025-38006 [net: mctp: Don't access ifa_index when missing]
+ - linux 6.12.30-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f11cf946c0a92c560a890d68e4775723353599e1 (6.15-rc7)
+CVE-2025-38005 [dmaengine: ti: k3-udma: Add missing locking]
+ - linux 6.12.30-1
+ [bookworm] - linux 6.1.140-1
+ NOTE: https://git.kernel.org/linus/fca280992af8c2fbd511bc43f65abb4a17363f2f (6.15-rc7)
CVE-2025-31698 [ATS: Client IP address from PROXY protocol is not used for ACL]
- trafficserver <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2025/06/17/7
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a41b89f0e95926d6b50a762ab7a3da056b1cc79f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a41b89f0e95926d6b50a762ab7a3da056b1cc79f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250618/f01fb2da/attachment.htm>
More information about the debian-security-tracker-commits
mailing list